The Fuzzy Integrated Evaluation of Embedded System Security.
Shaolong ZhangNing ZhouJiaxin WuPublished in: ICESS (2008)
Keyphrases
- ahp method
- fuzzy logic
- information security
- security threats
- evaluation model
- security issues
- membership functions
- fuzzy clustering
- fuzzy set theory
- fuzzy systems
- multi criteria
- fuzzy numbers
- fuzzy comprehensive evaluation
- security management
- group decision making
- database
- evaluation metrics
- network security
- fuzzy rules
- intrusion detection
- genetic algorithm